• J
    net: Make tcp_allowed_congestion_control readonly in non-init netns · 97684f09
    Jonathon Reinhart 提交于
    Currently, tcp_allowed_congestion_control is global and writable;
    writing to it in any net namespace will leak into all other net
    namespaces.
    
    tcp_available_congestion_control and tcp_allowed_congestion_control are
    the only sysctls in ipv4_net_table (the per-netns sysctl table) with a
    NULL data pointer; their handlers (proc_tcp_available_congestion_control
    and proc_allowed_congestion_control) have no other way of referencing a
    struct net. Thus, they operate globally.
    
    Because ipv4_net_table does not use designated initializers, there is no
    easy way to fix up this one "bad" table entry. However, the data pointer
    updating logic shouldn't be applied to NULL pointers anyway, so we
    instead force these entries to be read-only.
    
    These sysctls used to exist in ipv4_table (init-net only), but they were
    moved to the per-net ipv4_net_table, presumably without realizing that
    tcp_allowed_congestion_control was writable and thus introduced a leak.
    
    Because the intent of that commit was only to know (i.e. read) "which
    congestion algorithms are available or allowed", this read-only solution
    should be sufficient.
    
    The logic added in recent commit
    31c4d2f1: ("net: Ensure net namespace isolation of sysctls")
    does not and cannot check for NULL data pointers, because
    other table entries (e.g. /proc/sys/net/netfilter/nf_log/) have
    .data=NULL but use other methods (.extra2) to access the struct net.
    
    Fixes: 9cb8e048 ("net/ipv4/sysctl: show tcp_{allowed, available}_congestion_control in non-initial netns")
    Signed-off-by: NJonathon Reinhart <jonathon.reinhart@gmail.com>
    Signed-off-by: NDavid S. Miller <davem@davemloft.net>
    97684f09
sysctl_net_ipv4.c 35.8 KB